Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Port and Address Hopping for Active Cyber-Defense., , , and . PAISI, volume 4430 of Lecture Notes in Computer Science, page 295-300. Springer, (2007)Design of a Program Identification System for Preventing Malicious Codes., , and . CIS, page 429-433. IEEE, (2019)A semantically secure public key cryptoscheme using bit-pair shadows., , , and . Theor. Comput. Sci., (2016)A Fast Asymmetric Cryptosystem Using Extra Superincreasing Sequences., and . CoRR, (2017)An Identity-Based Signcryption Scheme with Short Ciphertext from Pairings., , , and . EUC Workshops, volume 4097 of Lecture Notes in Computer Science, page 342-351. Springer, (2006)Idology and Its Applications in Public Security and Network Security., , , , , and . PAISI, volume 10241 of Lecture Notes in Computer Science, page 129-149. (2017)A Lever Function to a New Codomain with Adequate Indeterminacy., , and . IACR Cryptology ePrint Archive, (2013)A Lightweight Hash Function Resisting Birthday Attack and Meet-in-the-middle Attack., , and . IACR Cryptology ePrint Archive, (2013)A New Non-Merkle-Damgård Structural Hash Function with Provable Security., , and . COCOON, volume 9198 of Lecture Notes in Computer Science, page 661-673. Springer, (2015)Asymptotic Granularity Reduction and Its Application, , and . CoRR, (2011)